 |
 |
|
 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
¶³ºÝÀ³¥Î( ¸ê°T¦w¥þ¡B¤j¼Æ¾ÚBig Data¡BService ) |
10:10-10:50 |
K1 |
¶³ºÝ®É¥N¤jÁͶաA ´x´¤°ê»Ú¶³ºÝ¦w¥þµo®i«ÂI |
^°ê¼Ð·Ç¨ó·|¥xÆW¤À¤½¥q »Z¾ð²± / Á`¸g²z |
501 |
11:00-11:40 |
K2 |
¶³ºÝ¸ê¦w·s¬D¾Ô¡A¥ø·~¥Í¦s¤j§@¾Ô ! |
ÁͶլì§Þ / §d»àë / ¸ê²`²£«~¸g²z |
501 |
11:50-12:30 |
K3 |
¸ê°T¦w¥þ¦A¶i¤Æ - ´¼¼z«¬¦w¥þÁp¨¾ |
McAfee ¨H§Ó©ú (Alex Shen) / ¸ê²`§Þ³N¸g²z |
501 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Web Security( APT, DDoS, IPS, ¶³ºÝ¨¤À»{ÃÒ,NGF) |
13:30-14:10 |
S1-1 |
[¤¤¤åºtÁ¿] ¤J«I¨¾¿mªº·s«äºû New Security Model. Before, During and After the attack |
Henry Ong / Cisco Sourcefire Regional SE Director - ASEAN and North Asia |
501 |
14:30-15:10 |
S1-2 |
ºô¾Ô¦M¾÷ - ¬°¦ó¥Ø¼ÐÁ`¬O§Ú¡H |
Nexusguard / ]ªF¼Ý / ¬ã¨sû |
501 |
15:30-16:10 |
S1-3 |
¶³ºÝ¶B´ÛÀË´ú( Fraud Detection ) |
Keypasco Founder & CEO ªLZÁo¥ý¥Í |
501 |
16:30-17:10 |
S1-4 |
Blue Coat¦p¦ó¨ó§U§A¥´³Ó³o³õµLÁnªº¾Ôª§ |
Blue Coat Taiwan ´¿¨}Â@ / §Þ³NÁ`ºÊ |
501 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Content Security ( Source Code, ¶l¥ó½]®Ö,¹q¤lñ³¹, ¸ê®Æ«OÅ@..) |
13:30-14:10 |
S2-1 |
¡y¶³ºÝ®ü¶q¸ê®Æ¤Uªº¶l¥ó½]®ÖÂkÀÉ·s§Þ³N¡z |
ºñ¦â¹Bºâ / ³¯¥ü¹ç / °ÆÁ`¸g²z |
503 |
14:30-15:10 |
S2-2 |
¤½¶}ª÷Æ_§Þ³Nµo®i»PÀ³¥ÎÁÍ¶Õ |
¤¤µØ¹q«H¬ã¨s°| / ³\ºðªÛ ¸ê³q¦w¥þ¬ã¨s©Ò¬ã¨sû |
503 |
15:30-16:10 |
S2-3 |
TrustView¥þ¤è¦ì¸Ñ¨M¤è®×-«OÅ@¾÷±K¡B Ó¸ê¡BSource Code |
ÀuºÓ¸ê°T / ³¯«~¿« / §Þ³N¦æ¾P¸g²z |
503 |
16:30-17:10 |
S2-4 |
°T®§¦w¥þ¡G§A©Ò¤£ª¾¹Dªº¥¿¸q»P¨¸´c§ð¨¾¾Ô |
Openfind / ªL®a¥¿ / ²£«~ºÞ²z³¡ ¸g²z |
503 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Infra, Web Application Security ( NGF, ¥D¾÷¦s¨ú¦æ¬°±±¨î, TCP/IP¨ì Web ¨¾Å@) |
13:30-14:10 |
S3-1 |
¦¸¥@¥N«Â¯Ù¨¾Å@ ¬ð¯}¨F½c¨¾¿mªºª¼ÂI¤Î°g«ä |
FireEye / ªLªÃ©¾ / ¸ê²`§Þ³NÅU°Ý |
509 |
14:30-15:10 |
S3-2 |
2014·s¥@¥N¶³ºÝªA°È¸ê¦w¨¾¿m·sµ¦²¤ |
Palo Alto Networks ÂÅ³Õ«Û / §Þ³N¸g²z |
509 |
15:30-16:10 |
S3-3 |
¨M¾Ô¶³ºÝ - DDoS ¨¾¿mªº³Ì¨ÎWeb Security¸Ñ¨M¤è®× |
Akamai Technologies ¶À¶}¦L / ¸ê²`¤uµ{®v |
509 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Storage / ³Æ´©³Æ¥÷ (ÀÉ®×,¸ê®Æ®w¦s¨ú½]®Ö,µwºÐ¸ê®Æ¾P·´,«Ê¥]Â^¨ú¶}©ñ¥¥x) |
13:30-14:10 |
S4-1 |
¨¾¸ê®Æ¥~¬ª·ÀI¡AALog´¦¶}ÀÉ®×/ DB / NetAPP¦s¨ú½]®Ö§ð²¤ |
¤¤µØ¼Æ¦ì¬ì§Þ ±i²ú«Ì / ALog ²£«~¸g²z |
521 |
14:30-15:10 |
S4-2 |
¤@Áû»ùȨâ»õ¤¸ªº¥¼Ãz¼u
µwºÐ¸ê®Æ¾P·´°h³õ¾÷¨î |
U-Reach ¦öµØ¬ì§Þ Àd«Ø¿« / ±M®×¸g²z |
521 |
15:30-16:10 |
S4-3 |
momentum¡A¤é¥»¯«¬Þ¯Å¸ê¦w¨úÃÒ¥¥x |
Terilogy Co., Ltd ±i§g / ¨Æ·~¾Ô²¤³¡ Specialist |
521 |
|
|
 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Networking Security (APT¡BDDoS §ðÀ»»P¨¾¿m) |
10:10-10:50 |
K4 |
ºô¸ô¸ê°T¾Ô¨ÓÁ{ ¬F©²»P¥Á¶¡¸ê¦wÁp¨¾ |
¦æ¬F°|¸ê³q¦w¥þ¿ì¤½«Ç / §d±Ò¤å / °Æ¥D¥ô |
501 |
11:00-11:40 |
K5 |
ºÖº¸¼¯´µ¥S§Ì©Ê®æ®t²§¡G ¥D°Ê¦¡¥ý¶i«Â¯Ù¤§°lÂÜ»P°»´ú§Þ³N¤À¨É |
ªü½X¬ì§Þ³Ð¿ì¤H Proofpoint §Þ³N°ÆÁ` / ¶ÀÄ£¤å ³Õ¤h |
501 |
11:50-12:30 |
K6 |
±q2020ºô¸ôÃöÁä³ø§i¡A ¬Ý¥ø·~APT¨¾¿mµ¦²¤ |
ÁͶլì§Þ / §d©vÀM / §Þ³NÅU°Ý |
501 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Web Security ( APT §Þ³N»PºÞ²z, DDoS ¦p¦ó©è¾×? Botnet ¨¾½dµ¦²¤¤j¤½¶}) |
13:30-14:10 |
S5-1 |
¦¸¥@¥N«Â¯Ù¨¾Å@
¹h¹D»PºÝÂIªº§¹¬üÁp¨¾ |
FireEye / ¼B«T¶¯ / §Þ³NÅU°Ý |
501 |
14:30-15:10 |
S5-2 |
Proofpoint APT¨¾¿m - Ý®e¡u§Þ³N»PºÞ²z¡v»Ý¨D |
¬ü°Óªü½XÃÒÂI°ê»ÚªÑ¥÷¦³¤½¥q ¥xÆW¤À¤½¥q / ®}©ú¹F / Á`¸g²z |
501 |
15:30-16:10 |
S5-3 |
[¤¤¤åºtÁ¿] How To Extend Data Center Protection Beyond Anti-DDoS |
Juniper Networks Simon Tong / ¸ê¦w±M®a |
501 |
16:30-17:10 |
S5-4 |
Botnet°í¤£¥iºR¡H §ðÀ»¤âªk¤Î¨¾½dµ¦²¤¤j¸Ñ±K |
ÁͶլì§Þ / §õ°ö¹ç / ¸ê²`§Þ³N±M®×¸g²z |
501 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Content Security ( ¸ê®Æ¥~¬ª¨¾Å@, ¦æ°Ê¶l¥óºÞ±±, ª«Ápºô¸ê¦w, Big Data ¤j¼Æ¾Ú¤ÀªR»P¹w´ú´¦ÅS) |
13:30-14:10 |
S6-1 |
±qÁú°ê«H¥Î§½KCBÓ¸ê¥~¬ª¨Æ¥ó ¬Ý¤º³¡«Â¯Ù¤Îº|¬}¨¾Å@ |
WareValley / Kenny Kim / COO |
503 |
14:30-15:10 |
S6-2 |
¶l¥óAPT¨¾¿m»P¦æ°Ê¶l¥óºÞ±± |
Cellopoint / ¤ý«Û¶¯ / ¦æ¾P·~°ÈÁ`ºÊ |
503 |
15:30-16:10 |
S6-3 |
¾Ö©êª«Ápºô¡A¸ê¦w¥ý¦æ - ³nµw¾ã¦X¡Bµ¦²¤§G§½·s«äºû |
Âîº~¬ì§Þ / ³¢©v¿« / Á`¸g²z |
503 |
16:30-17:10 |
S6-4 |
¦p¦ó±q¦w¥þªº¨¤«×¨Ó¬Ý¤j¼Æ¾Ú |
¦wùÖ¸ê°TªÑ¥÷¦³¤½¥q Ĭ©ÉµX / ²£«~¸g²z |
503 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Infra, Web Application Security ( AP T¨¾½u§G§½, º¯³z´ú¸Õ, PCI DSS 3.0 ¦w¥þ§Þ³NÀ³¥Î¡K) |
13:30-14:10 |
S7-1 |
APT ¦Ê®aª§»ï¡A¥¿½T§G§½¨¾¿m "³Ì«á¨¾½u" |
Lastline, Inc. ¿Û¨K³Ç / ¸ê²`¦w¥þ§Þ³NÅU°Ý |
510 |
14:30-15:10 |
S7-2 |
¦p¦ó¾ã¦X ISO 27001:2013 »P PCI DSS 3.0 ¥HÀ³¥I«H¥Î¥d¸ê®Æ¦w¥þ¦X³Wn¨D |
Nexusguard Consulting Âů§Á¾ / ¸ê¦w¸g²z |
510 |
15:30-16:10 |
S7-3 |
¥þ²y¸ê¦wÁͶջP APT ¨¾¿m§Þ³N |
Check Point / ³¯¼s¿Ä / §Þ³NÁ`ºÊ |
510 |
16:30-17:10 |
S7-4 |
±q¸ê¦w°·¶E¤Îº¯³z´ú¸Õ½Í¥ø·~©¿²¤ ªº¸ê¦wº|¬} |
¤¤µØ¹q«H¸ê¦wºÊ±±¤¤¤ß ¬I¦Æ¾± / º¯³z´ú¸Õ¹Î¶¤t³d¤H |
510 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Endpoint Security ºÝÂI¨¾Å@ ( Log ¥[¸Ñ±K, Access Control , ±b¸¹±K½X«OÅ@, Ó¸ê½LÂI..) |
13:30-14:10 |
S8-1 |
¯¦¤å( HIBUN ) : ¤é¥»No.1ªº¸ê°T¬ªº|¨¾Å@¸Ñ¨M¤è®×¡I |
¤é¥ß¨È²Ó¨È Hitachi ±i©v§» / ²£«~¸g²z |
521 |
14:30-15:10 |
S8-2 |
¶³ºÝ¡B¥æ©öºô¯¸±b¸¹±K½X¤§®zÂI¤ÀªR¡B ®i¥Ü»P«OÅ@ |
¶ø¼Ö¬ì§Þ / ¤ý°òÑÏ / Á`¸g²z |
521 |
15:30-16:10 |
S8-3 |
Ó¸ê½LÂI¤TÂIÆF |
Üc«O¸ê°T / ªô§Ó³Ç / ±M®×¸g²z |
521 |
|
|
 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
¤½¥qªv²z-ªk³W¿í´` (¥ø·~¥þ±¸ê¦wÀË´ú¡BŲÃÑ»P¯SÅvºÞ²z) |
10:10-10:50 |
K7 |
2013Ó¸êªk¤j¨Æ¬ö»P¥¼¨Ó®i±æ |
°]¹Îªk¤H¸ê°T¤u·~µ¦¶i·| ¬ì§Þªk«ß¬ã¨s©Ò ¿½´Q¤¯ / «ß®v «ß¬ã¨sû / «ß®v / »OÆWÓ¤H¸ê®Æ«OÅ@»PºÞ²z¨î«× (TPIPAS)±M·~ÅçÃÒ¤Hû |
501 |
11:00-11:40 |
K8 |
[¤¤^¤åºtÁ¿]
¥Ñ°ê»Ú¸ê¦wÀË´ú¤ÀªR¡Bºò«æÀ³ÅܤÎŲÃѸgÅç¬Ý¥Ø«e¥ø·~¦p¦ó¸Ñ? ¤é¯q½ÆÂøªº¸ê¦w¤Î¬ª±K°ÝÃD |
AccessData §Þ³NÁ`ºÊ (Jason Mical)
ų¯u¼Æ¦ì ¸ê²`ÅU°Ý ¶À·q³Õ |
501 |
11:50-12:30 |
K9 |
¤º³¡ºÞ²zªºª¼ÂI - ¯SÅv±b¸¹ |
¤O®®¸ê°T / ´^°ê¹F / ¸g²z |
501 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
Risk Security / service (¥¼ª¾´c·Nµ{¦¡¨Æ«e¨¾¿m°»´ú, Àç·~¯µ±Kªk»P½]®ÖºÞ²z,¥¨¶q¶l¥ó½]®Ö) |
13:30-14:10 |
S9-1 |
[¤¤^¤åºtÁ¿]
±¹ïºò«æ¸ê¦w¨Æ¥ó -
¦p¦ó¦³®Ä§Ö³tªº¥þ±°»´ú¤Î¤ÏÀ³ |
AccessData §Þ³NÁ`ºÊ (Jason Mical) ,
ìD¯u¼Æ¦ì ¸ê²`ÅU°Ý ¶À·q³Õ
|
503 |
14:30-15:10 |
S9-2 |
Àç·~¯µ±KºÞ²z»P½]®Ö¤u¨ãÀ³¥Î |
¤¤µØ¼Æ¦ì¬ì§Þ¥ø·~¸ê®Æ«OÅ@¬ã¨s¤p²Õ
§d¼Ý³Ô / ÅU°Ý |
503 |
15:30-16:10 |
S9-3 |
¥¨¶q¶l¥ó½]®Öy¸ñ»P·ÀI±±ºÞ¤§µo®iÁͶÕ
~ BIG DATA Email Discovery Solution |
¨ä¹F¬ì§Þ / ªL¨|«H¥ý¥Í |
503 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
BYOD ºÝÂI³]³ÆºÞ²z / Wireless Security ( ºÞ²z»P DLP ÝÅU) |
10:10-10:50 |
K10 |
²°T¶BÄF§ðÀ»¨Æ¥óåªR |
¤º¬F³¡Äµ¬F¸p¦D¨ÆÄµ¹î§½ 165 ±M½u / ³Å®¶ì / ²Õªø |
510 |
11:00-11:40 |
K11 |
¶}±Ò¥Î¤á¶}¤ß¡A¸ê¦w©ñ¤ßªº¦æ°ÊIT¤§ªù! |
MobileIron / Anthony Li
¸ê²`§Þ³N¤uµ{®v |
510 |
11:50-12:30 |
K12 |
¦³®Ä¨¾¿m DDoS §ðÀ»»P°§C·ÀI |
¸g½n¸ê°T C2 Square / ´^³Ó©¾ / §Þ³Nªø |
510 |
®É¶¡ |
³õ¦¸ |
ijÃD |
ºtÁ¿¼t°Ó / Á¿®v / ¾ºÙ |
·|ij«Ç |
BYOD ºÝÂI³]³ÆºÞ²z / Wireless Security |
13:30-14:10 |
S10-1 |
BYOD±z·Ç³Æ¦n¤F¶Ü? CA¥ø·~¦æ°ÊºÞ²z¤è®× |
CA Technologies / ¤ý²MŲ / ¸ê²`ÅU°Ý |
510 |
14:30-15:10 |
S10-2 |
¦æ°Ê¤ä¥I»P¦w¥þ |
Keypasco Founder & CEO ªLZÁo¥ý¥Í |
510 |
15:30-16:10 |
S10-3 |
Mobile DLP º[¶³ºÝ¦æ°Ê¸Ë¸m¦s¨ú±±ºÞ ¤§¾ã¦X»P©µ¦ù |
LetMobile »P Ericom¥xÆW°ÏÁ`¥N²z º~»â°ê»Ú²£«~§Þ³N¸g²z ¶Àº~©z |
510 |
|
|
|
|
 |
|
 |
|
 |
 |